Solved

W2000 and SID

Posted on 2004-08-15
2
254 Views
Last Modified: 2013-12-04
Background:
1) I do not run active directory, and
2) nobody other than me has an access to PC, and
3) I access the pc only locally

Question:
I detected other than administrators SID. How can I prevent other people to access and compromise my pc??

jbmd
0
Comment
Question by:jbmd
2 Comments
 
LVL 15

Accepted Solution

by:
Yan_west earned 25 total points
ID: 11806383
read this
http://windows.stanford.edu/docs/security2000.html

1- Remove access to everyone exept your user name to access to your computer locally,
2- open gpedit.msc and in your local windows security settings, be sure to remove access to everyone using this policy: "access this computer from network". Just enable this policy, and put no one in. .

from winnetmag:

"Log on locally. The Log on locally right lets users log on directly to a computer. This right and the Access this computer from network right are probably the two rights that new NT administrators most often overlook. I recommend that you remove this right from all groups except Administrators on servers. Doing so ensures that even if unauthorized users gain physical access to your server, they won't be able to log on unless they know an administrator-level username and password. Unauthorized users will see the message The local policy of this system does not permit you to log on interactively. Restricting this right won't prevent users from connecting to the system over the network, and restricting the Access this computer from network right won't prevent users from logging on locally to a computer."
0
 

Author Comment

by:jbmd
ID: 11807655
Additional "tiny" thing from the background: I do run webhosting from my pc.

1. I did "access this computer from network - to nobody"... and hopefully I will be able to open the pc after restart :-)

2. I will probably not do "Log on locally" restriction because I am running the pc from home.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question